General

  • Target

    6f774574adf66b3273841ed8b532c3f8ecefc43f6535e30373cb087e582fb298.exe

  • Size

    5.2MB

  • Sample

    240726-ea1vfsxfkg

  • MD5

    bca4516bd5eb00ec50c8bb875787a1fd

  • SHA1

    64dfc2f4b3759e3441aa25674fb996a43cd513f7

  • SHA256

    6f774574adf66b3273841ed8b532c3f8ecefc43f6535e30373cb087e582fb298

  • SHA512

    00c33ae13c5261d97522738abff171d57c0a2dc971b50194071e0b5df6245da7b2430b3333e1d6bcc6dbc7068f29d4702af648eef0cc605004f0403c5a025278

  • SSDEEP

    98304:JBs6efP9AVjPL0K+IdYdnkGzCgJU18bM:LfefPMPIzCgK16

Malware Config

Targets

    • Target

      6f774574adf66b3273841ed8b532c3f8ecefc43f6535e30373cb087e582fb298.exe

    • Size

      5.2MB

    • MD5

      bca4516bd5eb00ec50c8bb875787a1fd

    • SHA1

      64dfc2f4b3759e3441aa25674fb996a43cd513f7

    • SHA256

      6f774574adf66b3273841ed8b532c3f8ecefc43f6535e30373cb087e582fb298

    • SHA512

      00c33ae13c5261d97522738abff171d57c0a2dc971b50194071e0b5df6245da7b2430b3333e1d6bcc6dbc7068f29d4702af648eef0cc605004f0403c5a025278

    • SSDEEP

      98304:JBs6efP9AVjPL0K+IdYdnkGzCgJU18bM:LfefPMPIzCgK16

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks